General
-
Target
54550aef08cf90c9ab0bfd02ce28f1c8a8546956c2882784b1fc485a91e62270
-
Size
72KB
-
Sample
220725-e3748seghl
-
MD5
835d48cd0ce83cf2b429f0ebe6095ec8
-
SHA1
ebd8d094dd4901651ab59d6fc3b0ab83b3879363
-
SHA256
54550aef08cf90c9ab0bfd02ce28f1c8a8546956c2882784b1fc485a91e62270
-
SHA512
0aae78adc48d061341e5437636ace60d710ccf56dc21066c798f2e47d6b55ad82eb371175055d08087285f44f4a21bb46216728a81b14550d0b66d20bd89ab8d
Static task
static1
Behavioral task
behavioral1
Sample
54550aef08cf90c9ab0bfd02ce28f1c8a8546956c2882784b1fc485a91e62270.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
54550aef08cf90c9ab0bfd02ce28f1c8a8546956c2882784b1fc485a91e62270.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
54550aef08cf90c9ab0bfd02ce28f1c8a8546956c2882784b1fc485a91e62270
-
Size
72KB
-
MD5
835d48cd0ce83cf2b429f0ebe6095ec8
-
SHA1
ebd8d094dd4901651ab59d6fc3b0ab83b3879363
-
SHA256
54550aef08cf90c9ab0bfd02ce28f1c8a8546956c2882784b1fc485a91e62270
-
SHA512
0aae78adc48d061341e5437636ace60d710ccf56dc21066c798f2e47d6b55ad82eb371175055d08087285f44f4a21bb46216728a81b14550d0b66d20bd89ab8d
Score10/10-
Guloader payload
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-